On 05/24, Benny Pedersen wrote:
> reject spf_softfail in mta, or report to http://www.dnswl.org/ 

SPF_SOFTFAIL kind of sucks:
http://ruleqa.spamassassin.org/?daterev=20120519-r1340375-n&rule=%2Fspf

  MSECS    SPAM%     HAM%     S/O    RANK   SCORE  NAME   WHO/AGE
      0   3.2640  27.9430   0.105    0.67    0.00  SPF_PASS  
      0   6.3320   0.6518   0.907    0.58    0.00  SPF_SOFTFAIL  
      0   4.0263   1.1272   0.781    0.50    0.00  SPF_NEUTRAL  
      0        0        0   0.500    0.50    0.00  SPF_NONE  
      0   1.7415   1.6254   0.517    0.39    0.00  SPF_FAIL  

SPF_SOFTFAIL hits 6.3% of spam and 0.7% of ham, which is a pretty terrible
ratio, which gives it a rank of 0.58, where 1 is best (RCVD_IN_DNSWL_HI, in
fact), and 0 is worst.  A rank of 0.58 sucks.

Therefore rejecting on it at your MTA is a bad idea.  But it's your MTA.
I've done lots of things with my MTA on purpose that were a bad idea.

> (why
> did thay list a dynamic ip ?)

I don't think they did.

> if sender is legit why is it softfailing ?

Generally because people configure their SPF records badly.  SOFTFAIL
*means* the sending domain isn't certain they have all their legit sending
IPs listed.  So based on the protocol it's also inappropriate to use for
absolute blocking.  (In addition to the real world statistics above.)  It's
unfortunate.

-- 
"Wash daily from nose-tip to tail-tip; drink deeply, but never too deep;
And remember the night is for hunting, and forget not the day is for sleep."
- The Law of the Jungle, Rudyard Kipling
http://www.ChaosReigns.com

Reply via email to